Edge
Static task
static1
Behavioral task
behavioral1
Sample
38e0e2a5f64231c90640ba6f84d48d4c7a5b0bf48b30f14728b791b885447538.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
38e0e2a5f64231c90640ba6f84d48d4c7a5b0bf48b30f14728b791b885447538.dll
Resource
win10v2004-20230703-en
General
-
Target
38e0e2a5f64231c90640ba6f84d48d4c7a5b0bf48b30f14728b791b885447538
-
Size
356KB
-
MD5
6aebf6e80555d80e651813d0c50468cd
-
SHA1
2e2b7ae06842a1b1cfd2fb6da9c9fb9380e84547
-
SHA256
38e0e2a5f64231c90640ba6f84d48d4c7a5b0bf48b30f14728b791b885447538
-
SHA512
b1af703fb6f7e708a6be4e32a009ebe62c5b72155e77eed9da50d279e9aa13cae5aeb900445d6fd5d98fc029dd05e0de496875695abc356be0accbf4d9e5159f
-
SSDEEP
6144:IxO8GWQXUyfMyeLWZcfMQxht8XkMVm/Hm9SLykqxD2w:IxiNfMzSZckQxXkkMk/Hm9Serd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38e0e2a5f64231c90640ba6f84d48d4c7a5b0bf48b30f14728b791b885447538
Files
-
38e0e2a5f64231c90640ba6f84d48d4c7a5b0bf48b30f14728b791b885447538.dll windows x86
d0b093b52d81603e1ba0c44ac480eaae
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ws2_32
WSAIoctl
WSACleanup
setsockopt
htons
gethostbyname
socket
recv
select
closesocket
send
inet_addr
connect
WSAStartup
kernel32
TlsFree
SetLastError
SetUnhandledExceptionFilter
HeapSize
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
IsBadWritePtr
UnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
GetStringTypeA
GetStringTypeW
SetEndOfFile
TlsAlloc
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
LocalReAlloc
lstrcpynA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
lstrcmpA
GlobalFlags
GetVersion
GetCommandLineA
ExitThread
TlsGetValue
TlsSetValue
HeapReAlloc
RaiseException
RtlUnwind
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapFree
VirtualProtect
GetProcessHeap
HeapAlloc
GlobalMemoryStatusEx
GetCurrentThreadId
SetThreadExecutionState
GetModuleHandleW
GetProcessId
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetExitCodeProcess
FreeLibrary
GetLastError
ReadFile
GetVersionExA
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
LocalAlloc
LocalSize
LocalFree
CopyFileA
MoveFileExA
CreateDirectoryA
OpenProcess
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateMutexA
GetLocalTime
GetFileSize
SetFilePointer
lstrlenA
CreateThread
OutputDebugStringA
DeleteFileA
GetModuleFileNameA
LoadLibraryA
GetTickCount
lstrcatA
CreateFileA
WriteFile
TerminateProcess
ExitProcess
GetFileAttributesA
SetFileAttributesA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
GetProcAddress
GetCurrentProcess
WinExec
lstrcpyA
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
VirtualFree
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
SetForegroundWindow
SetWindowLongA
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
UnhookWindowsHookEx
LoadStringA
EnumWindows
SendMessageA
ShowWindow
GetWindowRect
SetWindowPos
GetSystemMetrics
ChangeDisplaySettingsA
FindWindowA
GetClassNameA
GetWindow
GetKeyState
GetAsyncKeyState
wsprintfA
MessageBoxA
GetForegroundWindow
GetWindowTextA
GetLastInputInfo
GetClientRect
CopyRect
GetDlgItem
GetWindowLongA
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
OpenProcessToken
DuplicateTokenEx
CloseServiceHandle
StartServiceCtrlDispatcherA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueA
RegisterServiceCtrlHandlerA
OpenSCManagerA
SetTokenInformation
CreateProcessAsUserA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
StartServiceA
OpenServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
SetServiceStatus
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
urlmon
URLDownloadToFileA
wininet
InternetOpenA
InternetReadFile
FindCloseUrlCache
FindNextUrlCacheEntryA
InternetGetConnectedState
InternetConnectA
FtpSetCurrentDirectoryA
FtpGetFileA
InternetCloseHandle
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
InternetOpenUrlA
Exports
Exports
Sections
.text Size: 152KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 156KB - Virtual size: 186KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ